Mobile Security

Mobile Security

Mobile Forensics Services

Sword & Shield leverages our extensive digital forensics experience, supported by proven methodologies, to properly interpret the information you provide.

Learn about mobile forensics news, trends and best practices.


Sep 2018

Eight Considerations for Remote Worker Cybersecurity

Working from your desk in the corporate office is probably the safest way of doing business since you have both physical and technological protections provided by your organization.  However, this may not always be feasible for either personal or business reasons.  By taking the appropriate remote worker cybersecurity precautions, you can work from home or on the go without jeopardizing your personal security or that...

Read More


Jul 2018

Mobile Application Security: Why It’s Important to Check Your Development

Smart phones and tablets have become increasingly popular in recent years, and, as a result, many individuals and organizations are developing mobile apps to make their product constantly available to users. The growth in mobile app development and the types of information stored in and accessible to these apps have dramatically increased their profile as a target for hackers. Any one of many simple errors...

Read More


Mar 2018

How to Increase Mobile App Security on your Devices

Mobile devices, such as tablets, smartphones, and watches, have become the primary technologies we use in both our personal and professional lives. According to comScore’s 2017 Cross Platform Future in Focus report, the average American adult spends almost three hours on their smartphone every day. What makes mobile devices so versatile are the multitude of apps at our fingertips. These apps empower us in many ways; from...

Read More


Jan 2018

MouseJack: The new way using a wireless mouse or keyboard leaves you vulnerable

By Ben Goodman You are sitting in your favorite coffee shop with your laptop. You’ve never been a fan of the laptop’s touch pad so you plug in the USB dongle for your favorite wireless mouse and begin browsing the internet, checking emails, etc. You stop using your laptop briefly to check your written notes. You notice a sudden flash of a window popping up,...

Read More


Sep 2017

Sword & Shield Enterprise Security Aims to Improve Mobile App Security

National cybersecurity firm launches mobile app security assessment service to ensure businesses and entrepreneurs offer and use secure mobile applications KNOXVILLE, Tenn. Sept. 21, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers detailed mobile application security assessments for Android, iOS, and Windows phone or tablet-based apps to determine their vulnerabilities and how sensitive information can...

Read More


Oct 2015

Simple Mobile Technology Security Advice

Follow our simple mobile technology security advice for staying protected while always connected. When people spend an average of 162 minutes a day on their mobile phones, staying protected while you’re always connected can become a daunting task. It’s important to understand mobile technology security in order to protect your personal and professional data. Hackers can use the websites you visit, can email phishing attacks to...

Read More


Jul 2015

Remember Mobile Devices Security when Implementing your Network Plan

Do you remember the days when business was conducted without a cell phone, tablet or other mobile gadget? Mobile devices security was the last thing on companies’ minds. What once was deemed a mere status symbol of convenience is now the preferred way to keep in touch with customers and access business-sensitive data. Today, employees expect access to company resources. But allowing employees to use their personal...

Read More


Jul 2015

Don’t Let Your Laptop Give up Your Patients’ PHI

As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...

Read More


Apr 2015

Have I Been Hacked?

After working in digital forensics for more than two decades, it is common to receive a call from a potential client who thinks they have been “hacked.” After a few minutes of conversation, a “paranoid client” meter can quickly become active. If it reaches a predetermined threshold, we systematically walk through the technical aspects required for this to be realistic and provide an honest assessment...

Read More

Page 1 of 212